Research Library

Powered by

Risk Management Research

  • Top 10 Ways to Achieve Agile Security

    Sponsored by: CloudPassage

    From the barrage of cyberattacks on enterprises to new threat vectors within networks due to the move to the cloud, CIOs and CISOs have more to consider around cybersecurity than ever before. Check out this brief albeit enlightening guide that reveals the 10 fundamental steps to help you get started on your own path to agile security nirvana.

  • The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure

    Sponsored by: Google Cloud

    Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.

  • Organizations Worldwide Fear GDPR Non-Compliance Could Put Them Out of Business

    Sponsored by: Veritas

    On average, firms are forecasting spending in excess of €1.3m ($1.4M) on GDPR readiness initiatives. Take a look at this infographic to reveal statistics regarding the GDPR deadline, including potential GDPR fallout, lack of technology hindering GDPR compliance, and more.

  • The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime

    Sponsored by: Kaspersky Lab

    According to Kaspersky Labs, 48% of all phishing attacks were focused on gleaning users' financial data. This white paper reveals how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.

  • When Cryptors Attack: Timeline of a Ransomware Infection

    Sponsored by: Kaspersky Lab

    The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.

  • Security Orchestration and Micro-Segmentation for Public and Private Cloud

    Sponsored by: Cloudvisory

    According to Gartner, misconfiguration and mistakes are the leading causes of operations incidents and successful security attacks.

  • Encryption Hiding Malware in Half of Cyber Attacks

    Sponsored by: A10 Networks

    A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.

  • Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises

    Sponsored by: A10 Networks

    Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk.

  • Expert Perspectives on Data Protection and GDPR Compliance

    Sponsored by: CyberArk Software, Inc

    A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance.

  • SWIFT Security Controls to be Mandatory by 2018

    Sponsored by: CyberArk Software, Inc

    Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.

  • Privileged Account Security

    Sponsored by: CyberArk Software, Inc

    55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.

  • How Ransomware Attacks have Changed

    Sponsored by: CyberArk Software, Inc

    Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.

  • AWS Security Fitness Guide

    Sponsored by:

    Strengthen your cloud and combat the criminals. Read this white paper to reveal how to make your AWS environment less vulnerable to cyberattacks and threats.

  • Logrythm's Security Analytics Platform: Product Overview

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.

  • The 6 Essentials for DevOps Team Excellence

    Sponsored by:

    A recent Enterprise Strategy Group survey found that 45% of organizations currently report having a "problematic shortage" of cybersecurity skills. Take an in-depth look at this white paper to reveal essentials that can help your enterprise form a smart framework for running a secure DevOps organization.

  • SIEM Analysis for Security Professionals

    Sponsored by: LogRhythm, Inc.

    This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.

  • 5 Ways to Ensure Digital Business Success

    Sponsored by: Entrust, Inc.

    Analysts predict that 40% of all digital initiatives will fail due to mismanagement of identity-related requirements. Read this white paper to uncover 5 ways to ensure stronger authentication and identity management within your business.

  • Mid-Year Cybersecurity Report 2017

    Sponsored by: Cisco Systems, Inc.

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

  • As a DevOps Engineer, What Should I know about Security Tools?

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to uncover what you should know about security tools and protection in order to properly secure your DevOps.

  • IT Security and the Devops Environment

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to reveal how to improve application and infrastructure security and to engage in methods of delivering security that don't interrupt the fast flow and time to delivery.

  • Why Security in DevOps is Essential to Software Development

    Sponsored by:

    What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.

  • GDPR Primer for the C-Suite and Board of Directors

    Sponsored by: CyberArk Software, Inc

    Take a closer look at this white paper to reveal what executives and board members need to know to prepare for the GDPR.

  • Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

    Sponsored by: CyberArk Software, Inc

    Discover why securing and managing privileged accounts should be an integral part of your organization's strategy in achieving SWIFT CSCF compliance.

  • Get your Enterprise Ready for GDPR

    Sponsored by: CyberArk Software, Inc

    Take a closer look at this white paper to reveal a checklist for securing personal data to prepare for the GDPR.

  • Proactively Protect Against Ransomware

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to reveal steps your organization can proactively take to prevent and not react to the threat of ransomware.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.